IPIP IPsec VPN itonela phakathi komatshini weLinux kunye neMikrotik ngasemva komnikezeli weNAT

I-Linux: Ubuntu 18.04.4 LTS (GNU/Linux 4.15.0-91-generic x86_64)

  • Eth0 1.1.1.1/32 IP yangaphandle
  • ipip-ipsec0 192.168.0.1/30 iya kuba yitonela yethu

Miktoik: CCR 1009, RouterOS 6.46.5

  • Eth0 10.0.0.2/30 IP yangaphakathi evela kumboneleli. I-IP yangaphandle ye-NAT yomboneleli iyaguquguquka.
  • ipip-ipsec0 192.168.0.2/30 iya kuba yitonela yethu

Siza kwenza itonela ye-IPsec kumatshini we-Linux usebenzisa i-racoon. Andiyi kuchaza iinkcukacha, kukho okulungileyo inqaku Ρƒ vvpoloskin.

Faka iipakethe eziyimfuneko:

sudo install racoon ipsec-tools

Siqwalasela i-racoon, iya kusebenza ngokwemiqathango njengomncedisi we-ipsec. Ekubeni i-mikrotik ikwimowudi engundoqo ayinako ukuthumela isichongi somxhasi esongezelelweyo, kwaye idilesi ye-IP yangaphandle edityaniswa ngayo kwiLinux iyaguquguquka, usebenzisa isitshixo ekwabelwana ngaso ngaphambili (ugunyaziso lwegama lokugqithisa) aluyi kusebenza, ekubeni igama lokugqitha kufuneka lithelekiswe nokuba nedilesi ye IP ye umamkeli oqhagamshelayo, okanye ngesichongi.

Siza kusebenzisa isigunyaziso sisebenzisa izitshixo zeRSA.

I-racoon daemon isebenzisa izitshixo kwifomathi ye-RSA, kwaye i-mikrotik isebenzisa ifomethi ye-PEM. Ukuba uvelisa izitshixo usebenzisa i-plainrsa-gen utility ehamba ne-racoon, ngoko awuyi kukwazi ukuguqula isitshixo sikawonkewonke seMikrotika kwifomathi ye-PEM ngoncedo lwayo - iguqula kuphela kwicala elinye: i-PEM ukuya kwi-RSA. Nokuba i-openssl okanye i-ssh-keygen ayinakufunda isitshixo esenziweyo yi-plainrsa-gen, ngoko ke uguqulo alunakwenzeka ukuba lusetyenziswe nabo.

Siza kuvelisa isitshixo se-PEM sisebenzisa i-openssl kwaye emva koko siyiguqulele i-racoon usebenzisa i-plainrsa-gen:

#  Π“Π΅Π½Π΅Ρ€ΠΈΡ€ΡƒΠ΅ΠΌ ΠΊΠ»ΡŽΡ‡
openssl genrsa -out server-name.pem 1024
# ИзвлСкаСм ΠΏΡƒΠ±Π»ΠΈΡ‡Π½Ρ‹ΠΉ ΠΊΠ»ΡŽΡ‡
openssl rsa -in server-name.pem -pubout > server-name.pub.pem
# ΠšΠΎΠ½Π²Π΅Ρ€Ρ‚ΠΈΡ€ΡƒΠ΅ΠΌ
plainrsa-gen -i server-name.pem -f server-name.privet.key
plainrsa-gen -i server-name.pub.pem -f server-name.pub.key

Siza kubeka izitshixo ezifunyenweyo kwifolda: /etc/racoon/certs/server. Ungalibali ukuseta umnini womsebenzisi phantsi kwegama lakhe i-daemon ye-racoon iqaliswe (ngokuqhelekileyo ingcambu) kwiimvume ze-600.

Ndiza kuchaza ukuseta i-mikrotik xa uqhagamshela ngeWinBox.

Layisha iqhosha le-server-name.pub.pem kwi-mikrotik: Imenyu "Iifayile" - "Layisha".

Vula icandelo elithi "IP" - "IP sec" - "Amaqhosha" ithebhu. Ngoku senza izitshixo - iqhosha elithi "Yenza isitshixo", emva koko uthumele iqhosha likawonkewonke le-mikrotika "Expor Pub. Isitshixo", unokuyikhuphela kwicandelo elithi "Iifayile", cofa ekunene kwifayile - "Khuphela".

Singenisa iqhosha likawonke-wonke le-racoon, "Ngenisa", kuluhlu oluhlayo lwendawo ethi "Igama lefayile" sijonga i-server-name.pub.pem esiyikhuphele ngaphambili.

Isitshixo sikawonke-wonke se-mikrotik kufuneka siguqulwe

plainrsa-gen -i mikrotik.pub.pem -f mikrotik.pub.key

kwaye uyibeke kwifolda /etc/racoon/certs, ungalibali malunga nomnini kunye namalungelo.

iracoon config enezimvo: /etc/racoon/racoon.conf

log info; # Π£Ρ€ΠΎΠ²Π΅Π½ΡŒ логирования, ΠΏΡ€ΠΈ ΠΎΡ‚Π»Π°Π΄ΠΊΠ΅ ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΠ΅ΠΌ Debug ΠΈΠ»ΠΈ Debug2.

listen {

    isakmp 1.1.1.1 [500]; # АдрСс ΠΈ ΠΏΠΎΡ€Ρ‚, Π½Π° ΠΊΠΎΡ‚ΠΎΡ€ΠΎΠΌ Π±ΡƒΠ΄Π΅Ρ‚ ΡΠ»ΡƒΡˆΠ°Ρ‚ΡŒ Π΄Π΅ΠΌΠΎΠ½.
    isakmp_natt 1.1.1.1 [4500]; # АдрСс ΠΈ ΠΏΠΎΡ€Ρ‚, Π½Π° ΠΊΠΎΡ‚ΠΎΡ€ΠΎΠΌ Π±ΡƒΠ΄Π΅Ρ‚ ΡΠ»ΡƒΡˆΠ°Ρ‚ΡŒ Π΄Π΅ΠΌΠΎΠ½ для ΠΊΠ»ΠΈΠ΅Π½Ρ‚ΠΎΠ² Π·Π° NAT.
    strict_address; # Π’Ρ‹ΠΏΠΎΠ»Π½ΡΡ‚ΡŒ ΠΎΠ±ΡΠ·Π°Ρ‚Π΅Π»ΡŒΠ½ΡƒΡŽ ΠΏΡ€ΠΎΠ²Π΅Ρ€ΠΊΡƒ привязки ΠΊ ΡƒΠΊΠ°Π·Π°Π½Π½Ρ‹ΠΌ Π²Ρ‹ΡˆΠ΅ IP.
}

path certificate "/etc/racoon/certs"; # ΠŸΡƒΡ‚ΡŒ Π΄ΠΎ ΠΏΠ°ΠΏΠΊΠΈ с сСртификатами.

remote anonymous { # БСкция, Π·Π°Π΄Π°ΡŽΡ‰Π°Ρ ΠΏΠ°Ρ€Π°ΠΌΠ΅Ρ‚Ρ€Ρ‹ для Ρ€Π°Π±ΠΎΡ‚Ρ‹ Π΄Π΅ΠΌΠΎΠ½Π° с ISAKMP ΠΈ согласования Ρ€Π΅ΠΆΠΈΠΌΠΎΠ² с ΠΏΠΎΠ΄ΠΊΠ»ΡŽΡ‡Π°ΡŽΡ‰ΠΈΠΌΠΈΡΡ хостами. Π’Π°ΠΊ ΠΊΠ°ΠΊ IP, с ΠΊΠΎΡ‚ΠΎΡ€ΠΎΠ³ΠΎ ΠΏΠΎΠ΄ΠΊΠ»ΡŽΡ‡Π°Π΅Ρ‚ΡΡ Mikrotik, динамичСский, Ρ‚ΠΎ ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΠ΅ΠΌ anonymous, Ρ‡Ρ‚ΠΎ Ρ€Π°Π·Ρ€Π΅ΡˆΠ°Π΅Ρ‚ ΠΏΠΎΠ΄ΠΊΠ»ΡŽΡ‡Π΅Π½ΠΈΠ΅ с любого адрСса. Если IP Ρƒ хостов статичСский, Ρ‚ΠΎ ΠΌΠΎΠΆΠ½ΠΎ ΡƒΠΊΠ°Π·Π°Ρ‚ΡŒ ΠΊΠΎΠ½ΠΊΡ€Π΅Ρ‚Π½Ρ‹ΠΉ адрСс ΠΈ ΠΏΠΎΡ€Ρ‚.

    passive on; # Π—Π°Π΄Π°Π΅Ρ‚ "сСрвСрный" Ρ€Π΅ΠΆΠΈΠΌ Ρ€Π°Π±ΠΎΡ‚Ρ‹ Π΄Π΅ΠΌΠΎΠ½Π°, ΠΎΠ½ Π½Π΅ Π±ΡƒΠ΄Π΅Ρ‚ ΠΏΡ‹Ρ‚Π°Ρ‚ΡŒΡΡ ΠΈΠ½ΠΈΡ†ΠΈΠΈΡ€ΠΎΠ²Π°Ρ‚ΡŒ ΠΏΠΎΠ΄ΠΊΠ»ΡŽΡ‡Π΅Π½ΠΈΡ.
    nat_traversal on; # Π’ΠΊΠ»ΡŽΡ‡Π°Π΅Ρ‚ использованиС Ρ€Π΅ΠΆΠΈΠΌΠ° NAT-T для ΠΊΠ»ΠΈΠ΅Π½Ρ‚ΠΎΠ², Ссли ΠΎΠ½ΠΈ Π·Π° NAT. 
    exchange_mode main; # Π Π΅ΠΆΠΈΠΌ ΠΎΠ±ΠΌΠ΅Π½Π° ΠΏΠ°Ρ€Π°ΠΌΠ΅Ρ‚Ρ€Π°ΠΌΠΈ ΠΏΠΎΠ΄ΠΊΠ»ΡŽΡ‡Π΅Π½ΠΈΡ, Π² Π΄Π°Π½Π½ΠΎΠΌ случаС ---согласованиС.
    my_identifier address 1.1.1.1; # Π˜Π΄Π΅Π½Ρ‚ΠΈΡ„ΠΈΡ†ΠΈΡ€ΡƒΠ΅ΠΌ наш linux хост ΠΏΠΎ Π΅Π³ΠΎ ip адрСсу.
    certificate_type plain_rsa "server/server-name.priv.key"; # ΠŸΡ€ΠΈΠ²Π°Ρ‚Π½Ρ‹ΠΉ ΠΊΠ»ΡŽΡ‡ сСрвСра.
    peers_certfile plain_rsa "mikrotik.pub.key"; # ΠŸΡƒΠ±Π»ΠΈΡ‡Π½Ρ‹ΠΉ ΠΊΠ»ΡŽΡ‡ Mikrotik.

    proposal_check claim; # Π Π΅ΠΆΠΈΠΌ согласования ΠΏΠ°Ρ€Π°ΠΌΠ΅Ρ‚Ρ€ΠΎΠ² ISAKMP туннСля. Racoon Π±ΡƒΠ΄Π΅Ρ‚ ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΠΎΠ²Π°Ρ‚ΡŒ значСния ΠΏΠΎΠ΄ΠΊΠ»ΡŽΡ‡Π°ΡŽΡ‰Π΅Π³ΠΎΡΡ хоста (ΠΈΠ½ΠΈΡ†ΠΈΠ°Ρ‚ΠΎΡ€Π°) для срока дСйствия сСссии                   ΠΈ Π΄Π»ΠΈΠ½Ρ‹ ΠΊΠ»ΡŽΡ‡Π°, Ссли Π΅Π³ΠΎ срок дСйствия сСссии большС, ΠΈΠ»ΠΈ Π΄Π»ΠΈΠ½Π° Π΅Π³ΠΎ ΠΊΠ»ΡŽΡ‡Π° ΠΊΠΎΡ€ΠΎΡ‡Π΅, Ρ‡Π΅ΠΌ Ρƒ ΠΈΠ½ΠΈΡ†ΠΈΠ°Ρ‚ΠΎΡ€Π°. Если срок дСйствия сСссии ΠΊΠΎΡ€ΠΎΡ‡Π΅, Ρ‡Π΅ΠΌ Ρƒ ΠΈΠ½ΠΈΡ†ΠΈΠ°Ρ‚ΠΎΡ€Π°, racoon ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΠ΅Ρ‚ собствСнноС Π·Π½Π°Ρ‡Π΅Π½ΠΈΠ΅ срока дСйствия сСссии ΠΈ Π±ΡƒΠ΄Π΅Ρ‚ ΠΎΡ‚ΠΏΡ€Π°Π²Π»ΡΡ‚ΡŒ сообщСниС RESPONDER-LIFETIME.
    proposal { # ΠŸΠ°Ρ€Π°ΠΌΠ΅Ρ‚Ρ€Ρ‹ ISAKMP туннСля.

        encryption_algorithm aes; # ΠœΠ΅Ρ‚ΠΎΠ΄ ΡˆΠΈΡ„Ρ€ΠΎΠ²Π°Π½ΠΈΡ ISAKMP туннСля.
        hash_algorithm sha512; # Алгоритм Ρ…Π΅ΡˆΠΈΡ€ΠΎΠ²Π°Π½ΠΈΡ, ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΠ΅ΠΌΡ‹ΠΉ для ISAKMP туннСля.
        authentication_method rsasig; # Π Π΅ΠΆΠΈΠΌ Π°ΡƒΡ‚Π΅Π½Ρ‚ΠΈΡ„ΠΈΠΊΠ°Ρ†ΠΈΠΈ для ISAKMP туннСля - ΠΏΠΎ RSA ΠΊΠ»ΡŽΡ‡Π°ΠΌ.
        dh_group modp2048; # Π”Π»ΠΈΠ½Π° ΠΊΠ»ΡŽΡ‡Π° для Π°Π»Π³ΠΎΡ€ΠΈΡ‚ΠΌΠ° Π”ΠΈΡ„Ρ„ΠΈ-Π₯Π΅Π»Π»ΠΌΠ°Π½Π° ΠΏΡ€ΠΈ согласовании ISAKMP туннСля.
        lifetime time 86400 sec; ВрСмя дСйствия сСссии.
    }

    generate_policy on; # АвтоматичСскоС созданиС ESP Ρ‚ΡƒΠ½Π½Π΅Π»Π΅ΠΉ ΠΈΠ· запроса, ΠΏΡ€ΠΈΡˆΠ΅Π΄ΡˆΠ΅Π³ΠΎ ΠΎΡ‚ ΠΏΠΎΠ΄ΠΊΠ»ΡŽΡ‡Π°ΡŽΡ‰Π΅Π³ΠΎΡΡ хоста.
}

sainfo anonymous { # ΠŸΠ°Ρ€Π°ΠΌΠ΅Ρ‚Ρ€Ρ‹ ESP Ρ‚ΡƒΠ½Π½Π΅Π»Π΅ΠΉ, anonymous - ΡƒΠΊΠ°Π·Π°Π½Π½Ρ‹Π΅ ΠΏΠ°Ρ€Π°ΠΌΠ΅Ρ‚Ρ€Ρ‹ Π±ΡƒΠ΄ΡƒΡ‚ ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΠΎΠ²Π°Π½Ρ‹ ΠΊΠ°ΠΊ ΠΏΠ°Ρ€Π°ΠΌΠ΅Ρ‚Ρ€Ρ‹ ΠΏΠΎ ΡƒΠΌΠΎΠ»Ρ‡Π°Π½ΠΈΡŽ. Для Ρ€Π°Π·Π½Ρ‹Ρ… ΠΊΠ»ΠΈΠ΅Π½Ρ‚ΠΎΠ², ΠΏΠΎΡ€Ρ‚ΠΎΠ², ΠΏΡ€ΠΎΡ‚ΠΎΠΊΠΎΠ»ΠΎΠ² ΠΌΠΎΠΆΠ½ΠΎ              Π·Π°Π΄Π°Π²Π°Ρ‚ΡŒ Ρ€Π°Π·Π½Ρ‹Π΅ ΠΏΠ°Ρ€Π°ΠΌΠ΅Ρ‚Ρ€Ρ‹, сопоставлСниС происходит ΠΏΠΎ ip адрСсам, ΠΏΠΎΡ€Ρ‚Π°ΠΌ, ΠΏΡ€ΠΎΡ‚ΠΎΠΊΠΎΠ»Π°ΠΌ.

    pfs_group modp2048; # Π”Π»ΠΈΠ½Π° ΠΊΠ»ΡŽΡ‡Π° для Π°Π»Π³ΠΎΡ€ΠΈΡ‚ΠΌΠ° Π”ΠΈΡ„Ρ„ΠΈ-Π₯Π΅Π»Π»ΠΌΠ°Π½Π° для ESP Ρ‚ΡƒΠ½Π½Π΅Π»Π΅ΠΉ.
    lifetime time 28800 sec; # Π‘Ρ€ΠΎΠΊ дСйствия ESP Ρ‚ΡƒΠ½Π½Π΅Π»Π΅ΠΉ.
    encryption_algorithm aes; # ΠœΠ΅Ρ‚ΠΎΠ΄ ΡˆΠΈΡ„Ρ€ΠΎΠ²Π°Π½ΠΈΡ ESP Ρ‚ΡƒΠ½Π½Π΅Π»Π΅ΠΉ.
    authentication_algorithm hmac_sha512; # Алгоритм Ρ…Π΅ΡˆΠΈΡ€ΠΎΠ²Π°Π½ΠΈΡ, ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΠ΅ΠΌΡ‹ΠΉ для Π°ΡƒΡ‚Π΅Π½Ρ‚ΠΈΡ„ΠΈΠΊΠ°Ρ†ΠΈΠΈ ESP Ρ‚ΡƒΠ½Π½Π΅Π»Π΅ΠΉ.
    compression_algorithm deflate; # Π‘ΠΆΠΈΠΌΠ°Ρ‚ΡŒ ΠΏΠ΅Ρ€Π΅Π΄Π°Π²Π°Π΅ΠΌΡ‹Π΅ Π΄Π°Π½Π½Ρ‹Π΅, Π°Π»Π³ΠΎΡ€ΠΈΡ‚ΠΌ сТатия прСдлагаСтся Ρ‚ΠΎΠ»ΡŒΠΊΠΎ ΠΎΠ΄ΠΈΠ½.
}

uqwalaselo lwe mikrotik

Buyela kwicandelo "IP" - "IPsec"

"Iiprofayili" ithebhu
IParamu
Nentsingiselo

igama
Ngokwengqiqo yakho (ngokungagqibekanga)

Hash Algorithm
sha512

Uguqulelo oluntsonkothileyo
ees-128

Iqela le-DH
modp2048

Iproposhal_check
Kleyima

Ubomi bonke
1d 00:00:00

Ukuhanjiswa kweNAT
yinyani (jonga ibhokisi)

DPD
120

DPD Ubukhulu bokusilela
5

Ntanga tab
IParamu
Nentsingiselo

igama
Ngokwengqiqo yakho (emva koku kubhekiselwa kuyo njengeMyPeer)

idilesi
1.1.1.1 (oomatshini be-IP Linux)

Idilesi yendawo
10.0.0.2 (IP WAN interface mikrotik)

profayile
Engagqibekanga

Imo Yokutshintshana
eyona

I-Passive
amanga

Thumela u-INITIAL_CONTACT
oyinyaniso

Ithebhu yesindululo
IParamu
Nentsingiselo

igama
Ngokwengqiqo yakho (emva koku kubhekiselwa kuyo njengeMyPeerProposal)

Ububhali. Algorithms
sha512

Enncr. Algorithms
aes-128-cbc

Ubomi bonke
08:00:00

Iqela lePFS
modp2048

"Izazisi" ithebhu
IParamu
Nentsingiselo

Oontanga
Ntanga Yam

Atuh. Indlela
rsa isitshixo

isitshixo
mikrotik.privet.key

Isitshixo sokude
Igama lomncedisi.pub.pem

Iqela leSifanekiso sePolisi
Engagqibekanga

Notrack Chain
engenanto

Uhlobo lwesazisi sam
auto

Uhlobo lweSazisi olukude
auto

Tshatisa Ngu
id ekude

Uqwalaselo lweNdlela
engenanto

Yenza uMgaqo-nkqubo
hayi

Ithebhu "Imigaqo-nkqubo-Ngokubanzi"
IParamu
Nentsingiselo

Oontanga
Ntanga Yam

Ikhonkco
oyinyaniso

Src. Idilesi
192.168.0.0/30

Dest. Idilesi
192.168.0.0/30

Protocol
255 (bonke)

template
amanga

Ithebhu "Imigaqo-nkqubo-Isenzo"
IParamu
Nentsingiselo

inyathelo
kubhala

Nqanaba
umceli

IPsec Protocols
sp

Proposition
MyPeerProposal

Okunokwenzeka, njengam, une-snat/masquerade eqwalaselweyo kujongano lwakho lwe-WAN; lo mgaqo kufuneka uhlengahlengiswe ukuze iipakethi ze-ipsec eziphumayo zingene kwitonela yethu:
Yiya kwi "IP" - "Firewall" icandelo.
"NAT" ithebhu, vula umthetho wethu we-snat/masquerade.

iTab ekwinqanaba eliphezulu
IParamu
Nentsingiselo

IPsec Policy
ngaphandle: akukho

Ukuqalisa kwakhona idemon ye-racoon

sudo systemctl restart racoon

Ukuba i-racoon ayiqalisi ekuqaleni kwakhona, kukho impazamo kwi-config; kwi-syslog, i-racoon ibonisa ulwazi malunga nenombolo yomgca apho impazamo ifunyenwe khona.

Xa iibhutsi ze-OS, iracoon daemon iqala phambi kokuba ujongano lomsebenzi womnatha lunyuswe, kwaye sikhankanye i-strict_address ukhetho kwicandelo lokumamela; kufuneka udibanise iyunithi yeracoon kwifayile ye-systemd.
/lib/systemd/system/racoon.service, kwicandelo [Iyunithi], umgca After=network.target.

Ngoku iitonela zethu ze-ipsec kufuneka ziphakame, jonga isiphumo:

sudo ip xfrm policy

src 192.168.255.0/30 dst 192.168.255.0/30 
    dir out priority 2147483648 
    tmpl src 1.1.1.1 dst "IP NAT Ρ‡Π΅Ρ€Π΅Π· ΠΊΠΎΡ‚ΠΎΡ€Ρ‹ΠΉ ΠΏΠΎΠ΄ΠΊΠ»ΡŽΡ‡Π°Π΅Ρ‚ΡΡ mikrotik"
        proto esp reqid 0 mode tunnel
src 192.168.255.0/30 dst 192.168.255.0/30 
    dir fwd priority 2147483648 
    tmpl src "IP NAT Ρ‡Π΅Ρ€Π΅Π· ΠΊΠΎΡ‚ΠΎΡ€Ρ‹ΠΉ ΠΏΠΎΠ΄ΠΊΠ»ΡŽΡ‡Π°Π΅Ρ‚ΡΡ mikrotik" dst 1.1.1.1
        proto esp reqid 0 mode tunnel
src 192.168.255.0/30 dst 192.168.255.0/30 
    dir in priority 2147483648 
    tmpl src "IP NAT Ρ‡Π΅Ρ€Π΅Π· ΠΊΠΎΡ‚ΠΎΡ€Ρ‹ΠΉ ΠΏΠΎΠ΄ΠΊΠ»ΡŽΡ‡Π°Π΅Ρ‚ΡΡ mikrotik" dst 1.1.1.1
        proto esp reqid 0 mode tunnel

Ukuba amatonela akaphakamanga, jonga i-syslog, okanye i-journalctl -u racoon.

Ngoku kufuneka uqwalasele i-L3 interfaces ukuze itrafikhi ihambe. Kukho iinketho ezahlukeneyo, siya kusebenzisa i-IPIP, ekubeni i-mikrotik iyayixhasa, ndiya kusebenzisa i-vti, kodwa, ngelishwa, ayikaphunyezwa kwi-mikrotik. Ihluke kwi-IPIP ngokuba iyakwazi ukongeza i-multicast kwaye ifake ii-fwmarks kwiipakethi, apho zinokuthi zihluzwe kwiiptables kunye ne-iproute2 (umgaqo-nkqubo osekelwe kumgaqo-nkqubo). Ukuba ufuna ukusebenza okuphezulu, ngoko, umzekelo, GRE. Kodwa ungakulibali ukuba sihlawula umsebenzi owongezelelweyo ngentloko enkulu.

Ungalubona uguqulelo lophononongo olulungileyo lwemidibaniso yetonela apha.

Kwi Linux:

# Π‘ΠΎΠ·Π΄Π°Π΅ΠΌ интСрфСйс
sudo ip tunnel add ipip-ipsec0 local 192.168.255.1 remote 192.168.255.2 mode ipip
# АктивируСм
sudo ip link set ipip-ipsec0 up
# НазначаСм адрСс
sudo ip addr add 192.168.255.1/30 dev ipip-ipsec0

Ngoku unokongeza iindlela zothungelwano ngasemva kwe mikrotik

sudo ip route add A.B.C.D/Prefix via 192.168.255.2

Ukuze ujongano lwethu kunye neendlela ziphakanyiswe emva kokuqaliswa kwakhona, kufuneka sichaze i-interface kwi / etc / network / interfaces kwaye songeze iindlela apho kwi-post-up, okanye ubhale yonke into kwifayile enye, umzekelo, /etc/ ipip-ipsec0.conf kwaye uyitsale nge-post-up, ungalibali malunga nomnini wefayile, amalungelo kwaye uyenze iphunyezwe.

Ngezantsi ngumzekelo wefayile

#!/bin/bash
ip tunnel add ipip-ipsec0 local 192.168.255.1 remote 192.168.255.2 mode ipip
ip link set ipip-ipsec0 up
ip addr add 192.168.255.1/30 dev ipip-ipsec0

ip route add A.B.C.D/Prefix via 192.168.255.2

KwiMikrotik:

Icandelo "IiNdibaniselwano", yongeza ujongano olutsha "itonela ye-IP":

Ithebhu "Itonela ye-IP" - "Ngokubanzi"
IParamu
Nentsingiselo

igama
Ngokwengqiqo yakho (emva koku kubhekiselwa kuyo njenge-IPIP-IPsec0)

UMNTU
1480 (ukuba ayichazwanga, i-mikrotik iqala ukusika umntu ukuya kuma-68)

Idilesi yendawo
192.168.0.2

Idilesi ekude
192.168.0.1

IPsec Imfihlo
Yenza intsimi ingasebenzi (kungenjalo kuyakwenziwa uMlingane omtsha)

Gcina
Yenza intsimi ingasebenzi (kungenjalo ujongano luyacima rhoqo, kuba i mikrotika inefomathi yayo yezi phakheji kwaye ayisebenzi nge Linux)

I-DSCP
ilifa

Musa ukuqhekeza
hayi

Bamba TCP MSS
oyinyaniso

Vumela umendo okhawulezayo
oyinyaniso

Icandelo "IP" - "Iidilesi", yongeza idilesi:

IParamu
Nentsingiselo

idilesi
192.168.0.2/30

ujongano
IPIP-IPsec0

Ngoku unokongeza iindlela kuthungelwano ngasemva komatshini weLinux; xa usongeza indlela, isango liya kuba yi IPIP-IPsec0 yethu yojongano.

PS

Kuba iseva yethu yeLinux iyatshintsha, iyavakala ukuseta iparameter yeClamp TCP MSS yojongano lweipip kuyo:

yenza ifayile /etc/iptables.conf ngeziqulatho zilandelayo:

*mangle
-A POSTROUTING -o ipip+ -p tcp -m tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
COMMIT

kwaye kwi/etc/network/interfaces
post-up iptables-restore < /etc/iptables.conf

Ndine nginx esebenza kuthungelwano ngasemva kwe-mikrotik (ip 10.10.10.1), yenza ukuba ifikeleleke kwi-Intanethi, yongeze kuyo /etc/iptables.conf:

*nat
-A PREROUTING -d 1.1.1.1/32 -p tcp -m multiport --dports 80,443 -j DNAT --to-destination 10.10.10.1
#На mikrotik, Π² Ρ‚Π°Π±Π»ΠΈΡ†Π΅ mangle, Π½Π°Π΄ΠΎ Π΄ΠΎΠ±Π°Π²ΠΈΡ‚ΡŒ ΠΏΡ€Π°Π²ΠΈΠ»ΠΎ route с Π½Π°Π·Π½Π°Ρ‡Π΅Π½ΠΈΠ΅ΠΌ 192.168.0.1 для ΠΏΠ°ΠΊΠ΅Ρ‚ΠΎΠ² с адрСсом источника 10.10.10.1 ΠΈ ΠΏΠΎΡ€Ρ‚ΠΎΠ² 80, 443.

# Π’Π°ΠΊ ΠΆΠ΅ Π½Π° linux Ρ€Π°Π±ΠΎΡ‚Π°Π΅Ρ‚ OpenVPN сСрвСр 172.16.0.1/24, для ΠΊΠ»ΠΈΠ΅Π½Ρ‚ΠΎΠ² ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΡŽΡ‚ ΠΏΠΎΠ΄ΠΊΠ»ΡŽΡ‡Π΅Π½ΠΈΠ΅ ΠΊ Π½Π΅ΠΌΡƒ Π² качСствС шлюза Π΄Π°Π΅ΠΌ доступ Π² ΠΈΠ½Ρ‚Π΅Ρ€Π½Π΅Ρ‚
-A POSTROUTING -s 172.16.0.0/24 -o eth0 -j SNAT --to-source 1.1.1.1
COMMIT 

Ungalibali ukongeza iimvume ezifanelekileyo kwiiptables ukuba unezihlungi zepakethi ezisebenzayo.

Si kelela!

umthombo: www.habr.com

Yongeza izimvo